Multiple Choice
A security engineer has been hired to design a device that will enable the exfiltration of data from within a well-defended network perimeter during an authorized test. The device must bypass all firewalls and NIDS in place, as well as allow for the upload of commands from a centralized command and control server . The total cost of the device must be kept to a minimum in case the device is discovered during an assessment. Which of the following tools should the engineer load onto the device being designed?
A) Custom firmware with rotating key generation
B) Automatic MITM proxy
C) TCP beacon broadcast software
D) Reverse shell endpoint listener
Correct Answer:

Verified
Correct Answer:
Verified
Q145: A company recently experienced a security incident
Q146: One of the objectives of a bank
Q147: Following the successful response to a data-leakage
Q148: Ann, a security manager, is reviewing a
Q149: A database administrator is required to adhere
Q151: A large company with a very complex
Q152: An internal penetration tester was assessing a
Q153: A network printer needs Internet access to
Q154: The board of a financial services company
Q155: A security analyst is attempting to break